With a __________ attack the attacker is allowed to use the user as an "oracle". This means that the user may request signatures of messages that depend on previously obtained message-signature pairs.

A. adaptive chosen message
B. generic chosen
C. directed chosen message
D. known message

A. adaptive chosen message

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a set of columns whose values match the primary-key values of an- other table.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

__________ is not a tenet of the RISC processor-design philosophy.

a) Making the common case fast b) Reducing context switch latency c) Reducing the number of register–memory transfers d) Keep hardware simple

Computer Science & Information Technology